{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Internet Security paper - T opic Security of the I n te...

Info icon This preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
Topic: Security of the Internet Prof: Dr. Badamas Date: May 4, 2009
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
INTRODUCTION
Image of page 2
LITERATURE REVIEW
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
WHY IS INTERNET SECUTIRY   IMPORTANT TO I.S &I.T
Image of page 4
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
ASSESMENT OF SECURITY   TECHNOLOGY
Image of page 6
WORKS CITED AND   REFERENCES
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Introduction The Internet is a rapidly growing computer network of millions of business, educational, and governmental networks connecting hundreds of millions of computers and their users around the world. The Internet is not a single network, but a worldwide collection of loosely connected networks that are accessible by individual computer hosts in a variety of ways, including gateways, routers, dial-up connections, and Internet service providers. Security refers to the condition of being protected against danger or loss. The Internet provides convenient ways for data and information to be shared amongst users, However, with convenience comes risks. The Internet is not a secure place as many may have assumed. Since the beginning of the Internet era, there have been individuals finding new ways to jeopardize its users. The Internet is notorious for giving its users a feeling of security and anonymity when the truth is that users are very visible and open to new violations of their privacy. Users are not able to see who is on the other side of the connection so they believe no one is watching their actions. However, there are technologies that legally capture information that users input in their computers that are stored in ‘cookie files.’ These files can then be used by unauthorized users who have negative intentions. Internet security refers to the prevention of unauthorized access to computer systems through the Internet. There many ways that intrusion can occur. Unauthorized users can use software that take data from you computer without you even knowing or recognizing it, or they may take information through a trick or scam. The truth is that
Image of page 8
hackers are finding new and advanced ways to violate individuals privacy through networked computers. There have also been many fraudulent schemes used to trick users into giving away their personal information. For example there was a scheme called the ‘advance fee fraud,’ which started in 2006, that tricked many users into giving up sensitive and private information. There are many others like this as well. The point is that nothing that is done on the Internet is safe. This is why regular Internet users and especially companies invest time and money in making their interactions by the Internet safer. There are new technologies such as anti-virus & anti-spyware software’s, Internet security suits such as Norton, encryption, and firewalls. There have also been new organizations that have started to help find and investigate perpetrators.
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 10
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern